An ic card includes a first visible layer comprising a nonmetallic natural material having a physical structure including a unique visual pattern. The ic card further includes a storage device configured to store a reference image of the unique visual pattern. The reference image is a scan of the unique visual pattern. The reference image is configured to be visually compared with the unique visual pattern for authentication. A second layer is included on a bottom surface of the first visible layer. The first visible layer and the second layer are laminated together. Each of the second layer and the nonmetallic natural material of the first visible layer have a same size to define a shape of the ic card.
|
1. An ic card comprising:
a first visible layer comprising stone having a physical structure comprising a unique visual pattern;
a storage device configured to store a reference image of the unique visual pattern, wherein
the reference image is a scan of the unique visual pattern, and
the reference image is configured to be visually compared with the unique visual pattern for authentication; and
a second layer on a bottom surface of the first visible layer, wherein
the first visible layer and the second layer are laminated together, and
each of the second layer and the stone of the first visible layer have a same size to define a shape of the ic card.
16. An ic card comprising:
a visible first layer comprising a nonmetallic natural material having a physical structure comprising a unique visual pattern;
a second layer laminated to a bottom surface of the visible first layer, the second layer configured to physically support the visible first layer;
a third layer disposed over a portion of a top surface of the visible first layer, or a portion of the second layer, wherein
the top surface is opposite the bottom surface,
the third layer comprises a photograph of a portion of the unique visual pattern, and
the photograph comprises a physical area that is smaller than the portion of the unique visual pattern; and
a storage device configured to store a reference image comprising a scan of the unique visual pattern, the reference image being configured to be compared with the unique visual pattern for authentication.
8. A method of authenticating comprising:
reading, with an authentication apparatus, a reference image from an ic card, wherein the ic card comprises
a visible first layer comprising a nonmetallic natural material having a physical structure comprising a unique visual pattern,
a storage device to store the reference image, wherein the reference image comprises a scan of the unique visual pattern, and
a second layer on a bottom surface of the first visible layer so as to physically support said first visible layer, wherein the first visible layer and the second layer are laminated together, and wherein each of the second layer and the first visible layer have a same size to define a shape of the ic card;
scanning the unique visual pattern to generate a scanned image, wherein
the ic card further comprises a third layer comprising a photograph of the unique visual pattern disposed over a portion of a top surface,
the top surface is opposite the bottom surface, and
the photograph comprises a physical area that is smaller than a physical area of the portion of the unique visual pattern;
comparing the reference image with the scanned image; and
authenticating the ic card if the scanned image matches the reference image.
2. The ic card according to
3. The ic card according to
4. The ic card according to
5. The ic card according to
6. The ic card according to
7. The ic card according to
9. The method according to
10. The method according to
11. The method according to
12. The method according to
13. The method according to
14. The method according to
15. The method according to
17. The ic card according to
18. The ic card according to
19. The ic card according to
|
his application is a continuation of U.S. patent application Ser. No. 13/867,214, filed Apr. 22, 2013, and entitled “IC Card for Authentication and a Method for Authenticating the IC Card,” which claims priority to Italian Application No. MI2012A000706 filed Apr. 27, 2012, the contents of which are incorporated herein by reference in their entirety.
The present invention relates to an IC card for authentication, and to a method for authenticating the IC card. More particularly, a natural material is associated with the IC card for authentication.
The IC card involves a biometric feature originated by a natural material or by an artificial element, and the following description is made with reference to this application field for explanation purposes.
A natural material can be associated with an IC card for authentication and identification. In this respect, a publication titled “Smart Biometrics for Trust and Convenience,” Eurosmart, December 2010, discloses biometrics for authenticating and securely identifying, while taking in consideration several aspects, such as electronic ID, access passes, payment, and information such as emails and database records, and important paper documents, for example.
The above publication further mentions inanimate objects and even artificial objects among entities in which biometrics can be applied. Any “natural phenomenon for elements whose characteristics are chaotic and measurable” is defined as a biometric object. According to other sources1 natural phenomena not related to a biological material may have different designations, e.g., physical unduplicated features (cfr. IEEE 10.1109/ICASSP.2011.5946831).
A product, known as Prooftag™, uses air bubbles for authentication. This product overcomes the drawbacks of prior art authentication methods by using randomly generated air bubbles for authentication, which is unique in its form factors. Prior art authentication methods are based on mass-produced, and consequently, mass-reproducible methods.
However, Prooftag™ itself has several drawbacks. During the phase of authentication, each bubble tag is associated with a unique identifier stored in a database of a system operator. An Internet connection to such a database is required for any authentication, and the authentication cannot be executed if the connection is not available.
Another drawback of Prooftag™ is that it is configured to be attached to a product or to an IC card, and the attached tag can be detached during the delivery of the product, i.e., before the authentication of the product. In fact, the detached tag can be associated with another product if the consumer buying the first product did not perform or complete the authentication process. Moreover, a tag attached to an IC card makes the surface of the IC card non-planar and protruding with respect to the surface.
An object of the present invention is to provide an IC card and a method for authenticating the IC card with a remote connection not being required for an authentication, and with a natural material or artificial object being used to identify the IC card where no protrusion or detachable problems arise. This allows for a counterfeit resistant card product, and overcomes the drawbacks that currently affect the prior art methods and IC cards of this kind.
This and other objects, features and advantages are provided by coupling an IC card to a sample of a biometric object or natural material having a graphical layout or appearance that is visually distinguishable with respect to other samples, even with respect to a sample of the same biometric object or natural material. This is due to the unique pattern of each sample. In this manner, the sample of the biometric object or natural material is inlaid or embedded within a card layer or surface and cannot be detached from the IC card. A digital image of the sample is stored in the IC card chip at production.
When the IC card is exhibited, the digital image may be read or picked-up from the chip through an IC card reader and then displayed so that the unique pattern of the digital image may be compared to the unique pattern of the sample coupled or associated with the IC card surface for a visual comparison and authentication. Advantageously, the IC card cannot be duplicated starting from another sample of the same natural material or from samples of different materials.
The IC card may comprise at least a first visible layer reporting or providing a natural material or a biometric element, and a memory portion storing inside the IC card a reference image of the first visible layer to be visually compared with the first visible layer for authentication.
In other words, the IC card may comprise a first visible layer including a natural material, and a memory to store a digital reference image of the first layer. The digital reference image may be visually compared with the first layer for authentication.
In all of the possible embodiments for a visible layer, such a visible layer may include any surface that may be seen or detected by a natural eye or an image detector.
The natural material of the first visible layer may be selected from a group including wood or leather or stone or any natural material showing or defining a pattern or vein which may be visually compared with a pattern or vein displayed with the digital reference image. The display may be through a reader device of the IC card, for instance.
The term visual comparison includes an automatic comparing system based on an image detector or an equivalent detection.
A second protective layer may be provided on a surface of the first visible layer, for example, a plastic covering layer. A transparent layer may be further arranged on a counter disposed surface of the first layer for further protection. The transparent layer may allow inspection of the natural material within the first visible layer.
The IC card may further comprise a third layer arranged on a portion of the second layer or transparent layer, including a picture of the first visible layer. For example, the picture may be a downscaled image of a partial or an entire surface of the first visible layer, and is advantageously used for comparison with the first visual layer and/or with the digital reference image displayed on the IC card reader.
The picture in the third layer may be monochrome and include veining of the first visible layer. This allows the user to focus on some specific patterns of the natural material, corresponding to the grayscale or monochrome, for a better comparison.
Storing of the digital reference image may be done by an IC chip, a bar code, a 2D code, a magnetic band or an optical band. The digital reference image may be encrypted by an IC card issuer from the image of the first visible layer and stored in an encrypted format. Advantageously, the encryption of the reference image may be associated with the pattern considered as unique identification information of the IC card, since no samples with identical patterns are available.
The digital reference image may be digitally signed by an IC card issuer from the image of the first visible layer, and stored in an encrypted format in the IC card.
Another aspect is directed to a method for authenticating an IC card through an authentication apparatus, where the IC card may include a first visible layer comprising a natural material, and a memory for storing a digital reference image of the first visible layer. The method may comprise the steps of reading the digital reference image with the authentication apparatus, scanning the first visible layer, comparing the digital reference image with the scanned image of the first visible layer, and authenticating the IC card if the scanned image is substantially identical to the digital reference image.
Again, a visible layer is intended to include any surface that may be seen or detected by a natural eye or an image detector. The term visual comparison is intended to include an automatic comparing system based on an image detector or an equivalent detection.
The digital reference image may be displayed on the display device of the authentication apparatus for visual authentication.
The method may comprise retrieving the reference image, scanning the first layer into a sample image, comparing the retrieved reference image with the sample image, and authenticating the identity of the card if the sample image is determined to be substantially identical to the retrieved reference image.
The method may further comprise storing the reference image in the memory portion of the authentication apparatus after encrypting the reference image with a first key of the card issuer. The step of retrieving the reference image may comprise decrypting the reference image stored with a second key, and the second key may be associated with the first key.
Further advantages and features of the method, the device, and the media storage according to the present invention will be apparent from the description given below for explanation purposes and without limiting the scope of protection.
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute part of this application, illustrate different embodiments of the disclosure and together with the description serve to explain the principles of the disclosure.
The method steps hereafter described do not form a complete flow of the process for the manufacturing of integrated circuits. The techniques for manufacturing the integrated circuits currently used in the field, and commonly used process steps necessary for understanding the integrated circuits are included in the description.
The figures showing transversal sections of integrated electronic device portions during the manufacturing are not drawn to scale, but are instead drawn to show important characteristics.
With reference to
For a visible layer, it is intended to include any surface that may be seen or detected by a natural eye or an image detector. This is valid for all the embodiments disclosed herein. Without limiting the scope of the present invention, the following description is given with reference to an IC card with a chip for storing the digital reference image.
The digital reference image is an image of the natural pattern of layers 100 and is used to authenticate the IC card through an authentication device or IC card reader, as explained below. The digital reference image is stored in an encrypted form in the IC card, and is read by the IC card reader and therein decrypted. The decrypted image is displayed on the IC card reader to be visually compared with the natural pattern on the top side surface of the IC card.
However, one skilled in the art may imagine a comparison based on an image detector that does not require a visible display of the decrypted image as is necessary for humans.
Referring to
Advantageously, the natural material or biometric element is inlaid in the first layer and does not protrude from it. In other words, the natural material or biometric element is located in at least a card portion where no protrusion or detachable problems arise.
The natural material constitutes the first layer. For example, the first layer is a sheet of wood with a size substantially corresponding to a size of an IC card 7816 compliant, which is inlaid within further layers of the IC card. The second layer 150 serves as a supporting layer for the first layer 140, and the transparent layer 130 serves as a protective layer of the first layer 140. In one embodiment, the first layer 140 is a hard material and no transparent layer 130 is provided for protection.
An IC card issuer takes a picture of or scans the image of the first layer 140, and saves the scanned image in the IC chip 110 as a reference image. The image is preferably signed or encrypted by a key before being stored in the IC Chip 110.
Both a non-symmetric encryption scheme and a symmetric encryption scheme can be used. If a non-symmetric encryption scheme is used, the reference image is encrypted with a private key owned by the IC card issuer. Then, when the authentication is performed by an authentication apparatus, the reference image may be decrypted with a public key before comparing the digital reference image displayed on the authentication apparatus with the image of the first layer 140. The image of the first layer 140 is scanned by an optical device of the authentication apparatus. The public key is associated with the private key.
If a symmetric encryption scheme is used, the digital reference image is encrypted with a secret key only known to the IC card issuer and the authentication apparatus, or only known to the IC card issuer that perform authentication remotely. Then, when the authentication is performed by the authentication apparatus, the digital reference image is decrypted with the same secret key before comparing the digital reference image with the image of the first layer 140.
Since the pattern formed in the first layer is natural or naturally generated, it is almost impossible for a forger to reproduce the same pattern artificially without scanning or taking picture of the pattern of the first layer 140 and without using an artificial material. That is, the forger cannot counterfeit the same IC card unless he retains the same IC card. Moreover, even if he obtains the same IC card and gets the picture of the pattern of the first layer 140, he cannot collect information concerning the signed digital reference image which is stored in the IC card 110. Therefore, the security of the IC card is further enhanced by the IC chip and the natural pattern of the first layer.
In case wood is used as the material of the first layer, the graphical pattern may include the veining of the wood 190. In
Referring to
The transparent layer 230 serves as a protective layer of the first visible layer 240. The IC card comprises a third layer 220 arranged on a portion of the transparent layer 230 and includes a picture of the first layer. Particularly, the third layer 220 may have a downscaled image of a partial or an entire surface of the first layer 240. The ratio for the scale is predetermined and known only to the IC card issuer and the authenticate apparatus.
In this respect, the scale ratio is used as a further security measure, since a forger needs to discover the exact scale ratio to counterfeit the IC card. In a similar way, coordinates of an area of the first layer 240 in which the picture is taken are used as further security measure. That is, the coordinate of the area of the first layer 240 is not known to anyone except the IC card issuer and the authenticating apparatus.
A user can easily check the IC card by comparing the pattern of the first visual layer with the pattern of the picture of the third layer 220. The authenticating apparatus further compares the picture of the third layer 220 with the pattern of the first visual layer 240.
Preferably, the IC card issuer takes a picture or a scanned image of the first visible layer 240 and saves the image into the IC chip 210 as a digital reference image. The image is preferably signed or encrypted before being stored in the IC chip 210. Also in this embodiment, both a non-symmetric encryption scheme and a symmetric encryption scheme can be used.
Since the pattern in the first visual layer is naturally generated or made by a biometric element, it is almost impossible for the forger to reproduce the same pattern artificially without scanning or taking picture of the pattern of the first layer 240, and without using an artificial material. Thus, the forger cannot counterfeit the same IC card unless he retains the IC card. Even if he has the same IC card in his hands and gets the picture of the pattern of the first layer 240, he cannot retrieve information concerning the signed reference image stored in the IC card 210. Therefore, the security of the IC card is further enhanced by the IC chip and the natural pattern of the first visual layer.
Also in this embodiment, wood may be used as natural material of the first visible layer and the veining of the wood 290 forms the unique pattern.
According to this embodiment, the pattern of the natural material does not cover the entire area of the IC card but only a portion of the IC card. Scanning or taking a picture is performed on the first layer 320. The scanned image is compared with the digital reference image stored in the IC card 310 for the authentication. Various schemes of encryption can be used as explained in the previous embodiment.
Advantageously, the invention can enhance the security of an IC card using the naturally formed pattern of the natural material, such as wood, and storing the image of the pattern in advance as encrypted information in the IC card. The picture of the pattern is duplicated in a different scale and attached on a surface portion of the IC card for visual comparison between the image of the whole IC card and the picture attached at a portion of the IC card.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
4218674, | Sep 09 1975 | Dasy Inter S.A. | Method and a system for verifying authenticity safe against forgery |
4931629, | Apr 29 1988 | Security credit card | |
5521984, | Jun 10 1993 | Verification Technologies, Inc. | System for registration, identification and verification of items utilizing unique intrinsic features |
6199761, | Dec 09 1996 | ASSA ABLOY AB | Validation method for electronic cash cards and digital identity cards utilizing optical data storage |
6412701, | May 19 1997 | Hitachi Maxell, Ltd | Flexible IC module and method of its manufacture, and method of manufacturing information carrier comprising flexible IC module |
7793837, | Mar 30 2009 | Visa International Service Association | Authentication using physical characteristics of tokens |
20040207891, | |||
20050182729, | |||
20050216350, | |||
20070118822, | |||
20080121710, | |||
20080144947, | |||
20080245865, | |||
20090039154, | |||
20090155456, | |||
20090181215, | |||
20090294543, | |||
20110168781, | |||
20110309146, | |||
20120243797, | |||
20130170758, | |||
20130284803, | |||
CN101882232, | |||
GB2471999, | |||
WO2004044836, | |||
WO2007133163, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Oct 19 2018 | STMicroelectronics S.r.l. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Oct 19 2018 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Jun 29 2024 | 4 years fee payment window open |
Dec 29 2024 | 6 months grace period start (w surcharge) |
Jun 29 2025 | patent expiry (for year 4) |
Jun 29 2027 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jun 29 2028 | 8 years fee payment window open |
Dec 29 2028 | 6 months grace period start (w surcharge) |
Jun 29 2029 | patent expiry (for year 8) |
Jun 29 2031 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jun 29 2032 | 12 years fee payment window open |
Dec 29 2032 | 6 months grace period start (w surcharge) |
Jun 29 2033 | patent expiry (for year 12) |
Jun 29 2035 | 2 years to revive unintentionally abandoned end. (for year 12) |